Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–33 of 33 results for author: Guan, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19265  [pdf, other

    cs.CV eess.IV

    Mapping New Realities: Ground Truth Image Creation with Pix2Pix Image-to-Image Translation

    Authors: Zhenglin Li, Bo Guan, Yuanzhou Wei, Yiming Zhou, Jingyu Zhang, Jinxin Xu

    Abstract: Generative Adversarial Networks (GANs) have significantly advanced image processing, with Pix2Pix being a notable framework for image-to-image translation. This paper explores a novel application of Pix2Pix to transform abstract map images into realistic ground truth images, addressing the scarcity of such images crucial for domains like urban planning and autonomous vehicle training. We detail th… ▽ More

    Submitted 30 April, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

  2. arXiv:2404.15639  [pdf, other

    cs.CL

    CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code

    Authors: Batu Guan, Yao Wan, Zhangqian Bi, Zheng Wang, Hongyu Zhang, Yulei Sui, Pan Zhou, Lichao Sun

    Abstract: As Large Language Models (LLMs) are increasingly used to automate code generation, it is often desired to know if the code is AI-generated and by which model, especially for purposes like protecting intellectual property (IP) in industry and preventing academic misconduct in education. Incorporating watermarks into machine-generated content is one way to provide code provenance, but existing solut… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 13 pages, 7 figures

  3. arXiv:2404.12587  [pdf, other

    cs.AI

    Reinforcement Learning Approach for Integrating Compressed Contexts into Knowledge Graphs

    Authors: Ngoc Quach, Qi Wang, Zijun Gao, Qifeng Sun, Bo Guan, Lillian Floyd

    Abstract: The widespread use of knowledge graphs in various fields has brought about a challenge in effectively integrating and updating information within them. When it comes to incorporating contexts, conventional methods often rely on rules or basic machine learning models, which may not fully grasp the complexity and fluidity of context information. This research suggests an approach based on reinforcem… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by the 2024 International Conference on Machine Learning and Neural Networks (MLNN 2024)

  4. arXiv:2403.16792  [pdf, other

    cs.CL cs.SE

    Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback

    Authors: Zhangqian Bi, Yao Wan, Zheng Wang, Hongyu Zhang, Batu Guan, Fangxin Lu, Zili Zhang, Yulei Sui, Hai Jin, Xuanhua Shi

    Abstract: Large Language Models (LLMs) have shown remarkable progress in automated code generation. Yet, LLM-generated code may contain errors in API usage, class, data structure, or missing project-specific information. As much of this project-specific context cannot fit into the prompts of LLMs, we must find ways to allow the model to explore the project-level code context. We present CoCoGen, a new code… ▽ More

    Submitted 10 June, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

  5. arXiv:2403.16443  [pdf, other

    cs.CL cs.AI cs.SE

    CodeS: Natural Language to Code Repository via Multi-Layer Sketch

    Authors: Daoguang Zan, Ailun Yu, Wei Liu, Dong Chen, Bo Shen, Wei Li, Yafen Yao, Yongshun Gong, Xiaolin Chen, Bei Guan, Zhiguang Yang, Yongji Wang, Qianxiang Wang, Lizhen Cui

    Abstract: The impressive performance of large language models (LLMs) on code-related tasks has shown the potential of fully automated software development. In light of this, we introduce a new software engineering task, namely Natural Language to code Repository (NL2Repo). This task aims to generate an entire code repository from its natural language requirements. To address this task, we propose a simple y… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: https://github.com/NL2Code/CodeS

  6. arXiv:2402.18066  [pdf, other

    cs.CV

    Six-Point Method for Multi-Camera Systems with Reduced Solution Space

    Authors: Banglei Guan, Ji Zhao, Laurent Kneip

    Abstract: Relative pose estimation using point correspondences (PC) is a widely used technique. A minimal configuration of six PCs is required for generalized cameras. In this paper, we present several minimal solvers that use six PCs to compute the 6DOF relative pose of a multi-camera system, including a minimal solver for the generalized camera and two minimal solvers for the practical configuration of tw… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: arXiv admin note: text overlap with arXiv:2102.11996

  7. arXiv:2401.14242  [pdf, other

    cs.CL

    Improving Natural Language Capability of Code Large Language Model

    Authors: Wei Li, Daoguang Zan, Bei Guan, Ailun Yu, Xiaolin Chen, Yongji Wang

    Abstract: Code large language models (Code LLMs) have demonstrated remarkable performance in code generation. Nonetheless, most existing works focus on boosting code LLMs from the perspective of programming capabilities, while their natural language capabilities receive less attention. To fill this gap, we thus propose a novel framework, comprising two modules: AttentionExtractor, which is responsible for e… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  8. arXiv:2401.13051  [pdf, other

    cs.CV eess.IV

    PA-SAM: Prompt Adapter SAM for High-Quality Image Segmentation

    Authors: Zhaozhi Xie, Bochen Guan, Weihao Jiang, Muyang Yi, Yue Ding, Hongtao Lu, Lei Zhang

    Abstract: The Segment Anything Model (SAM) has exhibited outstanding performance in various image segmentation tasks. Despite being trained with over a billion masks, SAM faces challenges in mask prediction quality in numerous scenarios, especially in real-world contexts. In this paper, we introduce a novel prompt-driven adapter into SAM, namely Prompt Adapter Segment Anything Model (PA-SAM), aiming to enha… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Comments: Code is available at https://github.com/xzz2/pa-sam

  9. arXiv:2401.08984  [pdf, other

    cs.LG cs.AI cs.CR

    A GAN-based data poisoning framework against anomaly detection in vertical federated learning

    Authors: Xiaolin Chen, Daoguang Zan, Wei Li, Bei Guan, Yongji Wang

    Abstract: In vertical federated learning (VFL), commercial entities collaboratively train a model while preserving data privacy. However, a malicious participant's poisoning attack may degrade the performance of this collaborative model. The main challenge in achieving the poisoning attack is the absence of access to the server-side top model, leaving the malicious participant without a clear target model.… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

    Comments: 6 pages, 7 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  10. arXiv:2312.07536  [pdf, other

    cs.CV

    FreeControl: Training-Free Spatial Control of Any Text-to-Image Diffusion Model with Any Condition

    Authors: Sicheng Mo, Fangzhou Mu, Kuan Heng Lin, Yanli Liu, Bochen Guan, Yin Li, Bolei Zhou

    Abstract: Recent approaches such as ControlNet offer users fine-grained spatial control over text-to-image (T2I) diffusion models. However, auxiliary modules have to be trained for each type of spatial condition, model architecture, and checkpoint, putting them at odds with the diverse intents and preferences a human designer would like to convey to the AI models during the content creation process. In this… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Project Page: https://genforce.github.io/freecontrol/

  11. arXiv:2308.05872  [pdf, other

    cs.CV

    Vision Backbone Enhancement via Multi-Stage Cross-Scale Attention

    Authors: Liang Shang, Yanli Liu, Zhengyang Lou, Shuxue Quan, Nagesh Adluru, Bochen Guan, William A. Sethares

    Abstract: Convolutional neural networks (CNNs) and vision transformers (ViTs) have achieved remarkable success in various vision tasks. However, many architectures do not consider interactions between feature maps from different stages and scales, which may limit their performance. In this work, we propose a simple add-on attention module to overcome these limitations via multi-stage and cross-scale interac… ▽ More

    Submitted 14 August, 2023; v1 submitted 10 August, 2023; originally announced August 2023.

  12. arXiv:2307.15370  [pdf, other

    cs.SE

    Private-Library-Oriented Code Generation with Large Language Models

    Authors: Daoguang Zan, Bei Chen, Yongshun Gong, Junzhi Cao, Fengji Zhang, Bingchao Wu, Bei Guan, Yilong Yin, Yongji Wang

    Abstract: Large language models (LLMs), such as Codex and GPT-4, have recently showcased their remarkable code generation abilities, facilitating a significant boost in coding efficiency. This paper will delve into utilizing LLMs for code generation in private libraries, as they are widely employed in everyday programming. Despite their remarkable capabilities, generating such private APIs poses a formidabl… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  13. arXiv:2306.12996  [pdf, other

    cs.CV

    Affine Correspondences between Multi-Camera Systems for Relative Pose Estimation

    Authors: Banglei Guan, Ji Zhao

    Abstract: We present a novel method to compute the relative pose of multi-camera systems using two affine correspondences (ACs). Existing solutions to the multi-camera relative pose estimation are either restricted to special cases of motion, have too high computational complexity, or require too many point correspondences (PCs). Thus, these solvers impede an efficient or accurate relative pose estimation w… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  14. arXiv:2306.03204  [pdf, other

    cs.CY cs.CV

    ChatGPT as a mapping assistant: A novel method to enrich maps with generative AI and content derived from street-level photographs

    Authors: Levente Juhász, Peter Mooney, Hartwig H. Hochmair, Boyuan Guan

    Abstract: This paper explores the concept of leveraging generative AI as a mapping assistant for enhancing the efficiency of collaborative mapping. We present results of an experiment that combines multiple sources of volunteered geographic information (VGI) and large language models (LLMs). Three analysts described the content of crowdsourced Mapillary street-level photographs taken along roads in a small… ▽ More

    Submitted 15 March, 2024; v1 submitted 5 June, 2023; originally announced June 2023.

    Comments: Submitted to The Fourth Spatial Data Science Symposium

    Journal ref: Spatial Data Science Symposium 2023

  15. arXiv:2305.16481  [pdf, other

    cs.CV

    SimHaze: game engine simulated data for real-world dehazing

    Authors: Zhengyang Lou, Huan Xu, Fangzhou Mu, Yanli Liu, Xiaoyu Zhang, Liang Shang, Jiang Li, Bochen Guan, Yin Li, Yu Hen Hu

    Abstract: Deep models have demonstrated recent success in single-image dehazing. Most prior methods consider fully supervised training and learn from paired clean and hazy images, where a hazy image is synthesized based on a clean image and its estimated depth map. This paradigm, however, can produce low-quality hazy images due to inaccurate depth estimation, resulting in poor generalization of the trained… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

    Comments: Submitted to ICIP 2023

  16. arXiv:2304.07506  [pdf, other

    cs.IR cs.AI

    Hierarchical and Contrastive Representation Learning for Knowledge-aware Recommendation

    Authors: Bingchao Wu, Yangyuxuan Kang, Daoguang Zan, Bei Guan, Yongji Wang

    Abstract: Incorporating knowledge graph into recommendation is an effective way to alleviate data sparsity. Most existing knowledge-aware methods usually perform recursive embedding propagation by enumerating graph neighbors. However, the number of nodes' neighbors grows exponentially as the hop number increases, forcing the nodes to be aware of vast neighbors under this recursive propagation for distilling… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    Comments: Accepted by ICME 2023

  17. arXiv:2301.06031  [pdf

    cs.CR cs.LG

    A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis

    Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan

    Abstract: The Android operating system is pervasively adopted as the operating system platform of choice for smart devices. However, the strong adoption has also resulted in exponential growth in the number of Android based malicious software or malware. To deal with such cyber threats as part of cyber investigation and digital forensics, computational techniques in the form of machine learning algorithms a… ▽ More

    Submitted 15 January, 2023; originally announced January 2023.

    Comments: 18 pages

  18. arXiv:2212.09420  [pdf, other

    cs.SE cs.AI cs.CL cs.PL

    Large Language Models Meet NL2Code: A Survey

    Authors: Daoguang Zan, Bei Chen, Fengji Zhang, Dianjie Lu, Bingchao Wu, Bei Guan, Yongji Wang, Jian-Guang Lou

    Abstract: The task of generating code from a natural language description, or NL2Code, is considered a pressing and significant challenge in code intelligence. Thanks to the rapid development of pre-training techniques, surging large language models are being proposed for code, sparking the advances in NL2Code. To facilitate further research and applications in this field, in this paper, we present a compre… ▽ More

    Submitted 8 May, 2023; v1 submitted 19 December, 2022; originally announced December 2022.

    Comments: Accepted to the main conference of ACL 2023 (long paper)

  19. arXiv:2211.13926  [pdf

    eess.IV cs.CV

    Generative Modeling in Sinogram Domain for Sparse-view CT Reconstruction

    Authors: Bing Guan, Cailian Yang, Liu Zhang, Shanzhou Niu, Minghui Zhang, Yuhao Wang, Weiwen Wu, Qiegen Liu

    Abstract: The radiation dose in computed tomography (CT) examinations is harmful for patients but can be significantly reduced by intuitively decreasing the number of projection views. Reducing projection views usually leads to severe aliasing artifacts in reconstructed images. Previous deep learning (DL) techniques with sparse-view data require sparse-view/full-view CT image pairs to train the network with… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

    Comments: 11 pages, 12 figures

  20. arXiv:2210.17236  [pdf, other

    cs.PL cs.CL cs.SE

    When Language Model Meets Private Library

    Authors: Daoguang Zan, Bei Chen, Zeqi Lin, Bei Guan, Yongji Wang, Jian-Guang Lou

    Abstract: With the rapid development of pre-training techniques, a number of language models have been pre-trained on large-scale code corpora and perform well in code generation. In this paper, we investigate how to equip pre-trained language models with the ability of code generation for private libraries. In practice, it is common for programmers to write code using private libraries. However, this is a… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: EMNLP 2022 Findings

  21. arXiv:2210.10998  [pdf, other

    eess.IV cs.CV cs.LG

    Semi-supervised object detection based on single-stage detector for thighbone fracture localization

    Authors: Jinman Wei, Jinkun Yao, Guoshan Zhanga, Bin Guan, Yueming Zhang, Shaoquan Wang

    Abstract: The thighbone is the largest bone supporting the lower body. If the thighbone fracture is not treated in time, it will lead to lifelong inability to walk. Correct diagnosis of thighbone disease is very important in orthopedic medicine. Deep learning is promoting the development of fracture detection technology. However, the existing computer aided diagnosis (CAD) methods baesd on deep learning rel… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: Preprint submitted to Applied Soft Computing

  22. arXiv:2206.06888  [pdf, other

    cs.SE cs.CL cs.PL

    CERT: Continual Pre-Training on Sketches for Library-Oriented Code Generation

    Authors: Daoguang Zan, Bei Chen, Dejian Yang, Zeqi Lin, Minsu Kim, Bei Guan, Yongji Wang, Weizhu Chen, Jian-Guang Lou

    Abstract: Code generation is a longstanding challenge, aiming to generate a code snippet based on a natural language description. Usually, expensive text-code paired data is essential for training a code generation model. Recently, thanks to the success of pre-training techniques, large language models are trained on large-scale unlabelled code corpora and perform well in code generation. In this paper, we… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: Accepted for publication at IJCAI-ECAI 2022

  23. arXiv:2201.10210  [pdf

    cs.CV

    Universal Generative Modeling for Calibration-free Parallel Mr Imaging

    Authors: Wanqing Zhu, Bing Guan, Shanshan Wang, Minghui Zhang, Qiegen Liu

    Abstract: The integration of compressed sensing and parallel imaging (CS-PI) provides a robust mechanism for accelerating MRI acquisitions. However, most such strategies require the explicit formation of either coil sensitivity profiles or a cross-coil correlation operator, and as a result reconstruction corresponds to solving a challenging bilinear optimization problem. In this work, we present an unsuperv… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

  24. arXiv:2110.10842  [pdf, other

    cs.CV cs.AI eess.IV

    SMOF: Squeezing More Out of Filters Yields Hardware-Friendly CNN Pruning

    Authors: Yanli Liu, Bochen Guan, Qinwen Xu, Weiyi Li, Shuxue Quan

    Abstract: For many years, the family of convolutional neural networks (CNNs) has been a workhorse in deep learning. Recently, many novel CNN structures have been designed to address increasingly challenging tasks. To make them work efficiently on edge devices, researchers have proposed various structured network pruning strategies to reduce their memory and computational cost. However, most of them only foc… ▽ More

    Submitted 20 October, 2021; originally announced October 2021.

    Comments: 11 pages, 4 figures

  25. arXiv:2108.12336  [pdf, other

    cs.CR cs.IT

    Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks

    Authors: Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: User privacy can be compromised by matching user data traces to records of their previous behavior. The matching of the statistical characteristics of traces to prior user behavior has been widely studied. However, an adversary can also identify a user deterministically by searching data traces for a pattern that is unique to that user. Our goal is to thwart such an adversary by applying small art… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  26. arXiv:2105.09540  [pdf, other

    cs.LG cs.AI cs.CR

    Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning

    Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang

    Abstract: The increasing concerns about data privacy and security drive an emerging field of studying privacy-preserving machine learning from isolated data sources, i.e., federated learning. A class of federated learning, vertical federated learning, where different parties hold different features for common users, has a great potential of driving a great variety of business cooperation among enterprises i… ▽ More

    Submitted 7 December, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

    Comments: 10 pages, 8 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  27. arXiv:2102.11996  [pdf, other

    cs.CV

    On Relative Pose Recovery for Multi-Camera Systems

    Authors: Ji Zhao, Banglei Guan

    Abstract: The point correspondence (PC) and affine correspondence (AC) are widely used for relative pose estimation. An AC consists of a PC across two views and an affine transformation between the small patches around this PC. Previous work demonstrates that one AC generally provides three independent constraints for relative pose estimation. For multi-camera systems, there is still not any AC-based minima… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

  28. arXiv:2007.10700  [pdf, other

    cs.CV cs.RO

    Minimal Cases for Computing the Generalized Relative Pose using Affine Correspondences

    Authors: Banglei Guan, Ji Zhao, Daniel Barath, Friedrich Fraundorfer

    Abstract: We propose three novel solvers for estimating the relative pose of a multi-camera system from affine correspondences (ACs). A new constraint is derived interpreting the relationship of ACs and the generalized camera model. Using the constraint, we demonstrate efficient solvers for two types of motions assumed. Considering that the cameras undergo planar motion, we propose a minimal solution using… ▽ More

    Submitted 19 August, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: ICCV 2021

  29. arXiv:1912.10776  [pdf, other

    cs.CV

    Minimal Solutions for Relative Pose with a Single Affine Correspondence

    Authors: Banglei Guan, Ji Zhao, Zhang Li, Fang Sun, Friedrich Fraundorfer

    Abstract: In this paper we present four cases of minimal solutions for two-view relative pose estimation by exploiting the affine transformation between feature points and we demonstrate efficient solvers for these cases. It is shown, that under the planar motion assumption or with knowledge of a vertical direction, a single affine correspondence is sufficient to recover the relative camera pose. The four c… ▽ More

    Submitted 3 April, 2020; v1 submitted 23 December, 2019; originally announced December 2019.

    Comments: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2020

  30. arXiv:1905.10915  [pdf, other

    cs.CV cs.LG eess.IV

    SpecNet: Spectral Domain Convolutional Neural Network

    Authors: Bochen Guan, Jinnian Zhang, William A. Sethares, Richard Kijowski, Fang Liu

    Abstract: The memory consumption of most Convolutional Neural Network (CNN) architectures grows rapidly with increasing depth of the network, which is a major constraint for efficient network training on modern GPUs with limited memory, embedded systems, and mobile devices. Several studies show that the feature maps (as generated after the convolutional layers) are the main bottleneck in this memory problem… ▽ More

    Submitted 8 February, 2021; v1 submitted 26 May, 2019; originally announced May 2019.

    Comments: Accepted by ICASSP 21. Contact author: Bochen Guan (bochen.guan@gmail.com)

  31. arXiv:1808.03735  [pdf, other

    eess.IV cs.CV

    Video Logo Retrieval based on local Features

    Authors: Bochen Guan, Hanrong Ye, Hong Liu, William A. Sethares

    Abstract: Estimation of the frequency and duration of logos in videos is important and challenging in the advertisement industry as a way of estimating the impact of ad purchases. Since logos occupy only a small area in the videos, the popular methods of image retrieval could fail. This paper develops an algorithm called Video Logo Retrieval (VLR), which is an image-to-video retrieval algorithm based on the… ▽ More

    Submitted 18 May, 2020; v1 submitted 10 August, 2018; originally announced August 2018.

    Comments: Accepted by ICIP 20. Contact author: Bochen Guan (gbochen@wisc.edu)

  32. arXiv:1711.00300  [pdf, other

    cs.CR

    Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage

    Authors: Issa Khalil, Bei Guan, Mohamed Nabeel, Ting Yu

    Abstract: Inference based techniques are one of the major approaches to analyze DNS data and detecting malicious domains. The key idea of inference techniques is to first define associations between domains based on features extracted from DNS data. Then, an inference algorithm is deployed to infer potential malicious domains based on their direct/indirect associations with known malicious ones. The way ass… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

  33. arXiv:1403.1937  [pdf, ps, other

    math.NA cs.CV

    A fast eikonal equation solver using the Schrodinger wave equation

    Authors: Karthik S. Gurumoorthy, Adrian M. Peter, Birmingham Hang Guan, Anand Rangarajan

    Abstract: We use a Schrödinger wave equation formalism to solve the eikonal equation. In our framework, a solution to the eikonal equation is obtained in the limit as Planck's constant $\hbar$ (treated as a free parameter) tends to zero of the solution to the corresponding linear Schrödinger equation. The Schrödinger equation corresponding to the eikonal turns out to be a \emph{generalized, screened Poisson… ▽ More

    Submitted 8 February, 2015; v1 submitted 8 March, 2014; originally announced March 2014.